Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
f35d83b1dbab29d9af2aebdcf9e6e7649d4e67371f02c291d977230228529a87.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f35d83b1dbab29d9af2aebdcf9e6e7649d4e67371f02c291d977230228529a87.dll
Resource
win10v2004-20220901-en
Target
f35d83b1dbab29d9af2aebdcf9e6e7649d4e67371f02c291d977230228529a87
Size
194KB
MD5
d946c04465e4ebc5b9b0995f4bd5af99
SHA1
c14c723414f132f0f44e52b0621dde6eba6abf28
SHA256
f35d83b1dbab29d9af2aebdcf9e6e7649d4e67371f02c291d977230228529a87
SHA512
2d132f0a2573b6e8cb1472760247873c0ee053babf13fc57b741d67bf2fabc663a9cdd316bd8f2d1c59bddf3892acd991f54483ec640e78ae0d048d69f99de9a
SSDEEP
3072:YcrYqwe+m2BWtUhhhqy0UE0ewxsVfZ4u94ywEek8:YeYcP7tUh3qy0UtL0Z4MMEek8
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameW
GetVersionExA
GetModuleFileNameA
GetModuleHandleA
lstrcatA
WriteFile
LoadLibraryW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedIncrement
InterlockedDecrement
FreeLibrary
GetModuleHandleW
lstrcmpiW
MultiByteToWideChar
LoadLibraryExW
CloseHandle
CreateFileW
DeleteFileA
FlushFileBuffers
GetCurrentProcessId
GetFileAttributesW
VirtualQuery
WideCharToMultiByte
lstrlenA
GetLastError
GetCurrentProcess
GlobalLock
Sleep
lstrcmpW
OpenMutexW
InterlockedExchangeAdd
GetLocalTime
SetFilePointer
ReadFile
SetStdHandle
GetConsoleMode
GetConsoleCP
RtlUnwind
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
RaiseException
GetProcAddress
lstrlenW
FindResourceExW
FindResourceW
LoadResource
LockResource
lstrcpyA
SizeofResource
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStartupInfoW
WriteConsoleW
GetFileType
SetHandleCount
IsProcessorFeaturePresent
GetStringTypeW
LCMapStringW
SetLastError
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapCreate
GetStdHandle
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCommandLineA
GetCurrentThreadId
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
EncodePointer
DecodePointer
FindWindowExW
GetClassNameW
GetParent
SetWindowLongW
RegisterWindowMessageW
GetTopWindow
GetWindowLongW
CharNextW
SendMessageW
CallWindowProcW
GetWindowThreadProcessId
GetWindow
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
SysAllocString
VariantChangeType
SysReAllocStringLen
SafeArrayUnlock
SafeArrayLock
SafeArrayDestroy
DispCallFunc
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetVartype
LoadTypeLi
LoadRegTypeLi
VarBstrCat
VarBstrCmp
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
VariantCopy
VariantClear
VariantInit
SysFreeString
VarUI4FromStr
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ